A huge amount of real‑world risk comes from basic endpoint misconfigurations e.g. weakened local security controls:
  • UAC disabled
  • Windows Firewall disabled
  • Insecure RDP settings
  • SMBv1 or other legacy/insecure protocols enabled
  • Bitlocker not enabled
  • Guest accounts enabled
Extend Managed ESPM with a managed “endpoint misconfiguration / secure configuration” posture view, focused on a Huntress‑curated set of critical OS and security settings (including examples like UAC, firewall, RDP, AV/EDR, encryption, local admin), with strong reporting so it doubles as both hardening and compliance evidence for customers globally.
Many security frameworks and standards (e.g. Cyber Essentials in the UK, NIS2, CIS benchmarks, ISO/27001, insurance questionnaires, etc.) all require secure configuration and proof that basic endpoint controls are enforced.
This would further protect and it would give partners/customers concrete evidence for these assessments: which endpoints were out of line, when they were detected, and when they were fixed.